The company’s Chief Information Officer (CIO) has become increasingly concerned that one of the company’s recent hires, a tech-savvy actuary, is directly accessing several production SQL Server databases using unapproved tools and access methods. Before approaching the employee’s supervisor, he has asked you, as the database administrator, to gather some additional information on the client application, network protocol, and queries that he believes the actuary is using on a routine basis. Your SQL Server 2012 instance is configured for Windows authentication only, and you manage role security using Active Directory. The database server is accessible only from within the Local Area Network (LAN), and no firewalls are present between the server and client applications. Your discussion board assignment is to:
Describe the potential pitfalls you envision in trying to execute this plan.
Explain which data elements you think will be most challenging to capture, and why.